VID |
14125 |
Severity |
10 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
Intruders can obtain the system information from illegally created or hidden suspicious files, and can change files arbitrarily. You should delete illegal or suspicious files after checking for
the existence of hidden files starting with [.].
* Affected platforms: UNIX, Linux |
Recommendation |
Take action as follows.
1. Delete unnecessary files from the list of hidden files 2. If you want to check recently worked files depending on the last time it was changed, use the [-t] flag |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|